EasyManuals Logo

Cisco Catalyst 9500 User Manual

Cisco Catalyst 9500
360 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #21 background imageLoading...
Page #21 background image
A networking device operating in the broadcast client mode does not engage in any polling. Instead, it listens
for NTP broadcast packets that are transmitted by broadcast time servers. Consequently, time accuracy can
be marginally reduced because time information flows only one way.
Use the ntp broadcast client command to set your networking device to listen for NTP broadcast packets
propagated through a network. For broadcast client mode to work, the broadcast server and its clients must
be located on the same subnet. You must enable the time server that transmits NTP broadcast packets on the
interface of the given device by using the ntp broadcast command.
NTP Security
The time kept on a device is a critical resource; you should use the security features of NTP to avoid the
accidental or malicious setting of an incorrect time. Two mechanisms are available: an access list-based
restriction scheme and an encrypted authentication mechanism.
We do not recommend configuring Message Direct 5 (MD5) authentication. You can use other supported
authentication methods for stronger encryption.
Note
NTP Access Group
The access list-based restriction scheme allows you to grant or deny certain access privileges to an entire
network, a subnet within a network, or a host within a subnet. To define an NTP access group, use the ntp
access-group command in global configuration mode.
The access group options are scanned in the following order, from least restrictive to the most restrictive:
1. ipv4 —Configures IPv4 access lists.
2. ipv6 —Configures IPv6 access lists.
3. peer —Allows time requests and NTP control queries, and allows the system to synchronize itself to a
system whose address passes the access list criteria.
4. serve —Allows time requests and NTP control queries, but does not allow the system to synchronize itself
to a system whose address passes the access list criteria.
5. serve-only —Allows only time requests from a system whose address passes the access list criteria.
6. query-only —Allows only NTP control queries from a system whose address passes the access list criteria.
If the source IP address matches the access lists for more than one access type, the first type is granted access.
If no access groups are specified, all access types are granted access to all systems. If any access groups are
specified, only the specified access types will be granted access.
For details on NTP control queries, see RFC 1305 (NTP Version 3).
The encrypted NTP authentication scheme should be used when a reliable form of access control is required.
Unlike the access list-based restriction scheme that is based on IP addresses, the encrypted authentication
scheme uses authentication keys and an authentication process to determine if NTP synchronization packets
sent by designated peers or servers on a local network are deemed as trusted before the time information that
they carry along with them is accepted.
The authentication process begins from the moment an NTP packet is created. Cryptographic checksum keys
are generated using the message digest algorithm 5 (MD5) and are embedded into the NTP synchronization
System Management Configuration Guide, Cisco IOS XE Amsterdam 17.2.x (Catalyst 9500 Switches)
5
Administering the Device
NTP Security

Table of Contents

Other manuals for Cisco Catalyst 9500

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 9500 and is the answer not in the manual?

Cisco Catalyst 9500 Specifications

General IconGeneral
SoftwareCisco IOS XE
Energy EfficiencyEnergy Efficient Ethernet (EEE)
WarrantyLimited Lifetime Hardware Warranty
SeriesCatalyst 9500
PortsUp to 48 ports (varies by model)
Power SupplyRedundant power supplies
Operating Temperature0°C to 40°C
WeightUp to 35 lbs (varies by model)
Memory16 GB DRAM, 16 GB Flash
ModularityModular uplinks and power supplies
SecurityCisco TrustSec, MACsec
RedundancyPower supply redundancy
ManagementCLI, SNMP, NETCONF
LatencySub-microsecond

Related product manuals